ࡱ> pro7 *bjbjUU 1F7|7|%%lFFFF&&&8^rDh,......$W wRR FFg@ rF8, , h~ e|&) @,HP    FFFFSecurity in Media Distributed Systems Description: This presentation will concentrate on security flaws in the telecommunications field. These flaws are currently being exploited by script kiddies with no forthcoming fixes. Most of the cryptographic algorithms developed for protection of streaming and stand alone video broadcasts have been broken. This document will demonstrate what products are broken, why they are broken, what manufacturers are doing about it, and what breaking them allows the user to do. HDTV (High Definition TV) All HDTV sets require encryption from content providers. This encryption is necessary for the authenticity and content protection of the digital signal. Media companies do not want people to be able to digitally replicate their transmissions. The protocol, named HDCP (High Bandwidth Digital Content Protection), and developed by Intel, was implemented on all HDTV sets manufactured after spring, 2002. If an individual bought an HDTV set, or a more expensive plasma TV before spring, 2002, the product is obsolete and will not be able to display an HDTV quality broadcast of 1080i. As of last year, HDCP has been broken by NielsFerguson.Working in the crypto field for many years, Ferguson does not want to revial his discovery due to the fear of prosecution from United States because of Digital Millienium Copyrights Act (DMCA) act. HDTV is supperior to any other current display technology on the market, including DVDs. Some TV stations already started broadcasting at HDTV quality, but most of them have not. FCC gave the industry six years to start displaying HDTV quality back in 1992. Unfortunately, due to faulty security engineering high definition broadcasting needs more time to appier on the screens. Even when watching DVDs, HDTV is not used to its fullest capacity. DVDs store about seven to nine gigabytes of data, while a truly 1080i movie takes about twenty gigabytes of the high definition signal. Cable Descrambers Cable Descramblers decode a signal that a cable TV company sends into the cable box. Each channel like HBO, Cinemax, Showtime, Playboy, and Pay-Per-View broadcast at different frequencies. Cable Descramblers demuxes these frequencies to present all the available channels to the customer. This is accomplished through a two stage process where a person sets the receiver to the test mode and then descarambles all the channels sent while in test mode. The cost for the usual setup of this technology is anywhere from eigthy to one hundred dollars and allows the individual to view all channels including Pay-Per-View and premium channels. Hughes DirecTV/DISH Networks DirecTV satellite networks have been compromised for some time. These systems use a smart card technology with authentication over phone lines. This protocol allows Hughes to update the firmware against current hacks to the system. The simplest and safest way to hack a DirectTV system is to use an active account and modify it to advertise all channels. Since the customer is valid and pays a basic subscriber rate, Hughes cannot disconnect him/her from their broadcasting network. This kind of a hack is accomplished by taking the smartcard, modifying it by rewriting the byte codes to accept all channels and unplugging the phone line. The owners receiver thinks the person owns the subscriptions to all the channels, but since telephone line is unplugged the receiver cannot confirm it, nor can it send the data to Hughes for validation. The Hughes receiver will now decode all the content available on the satellite broadcast. Another way to hack the DirectTV system is to create an artificial account. Once the artificial account is located, the hacker performs the same actions to receive TV programming. Hughes scans their broadcast paths every few months for unlawful users and shuts them out by looping their smartcards. Looping occurs when DirecTV authentication servers receive a signal from an unknown, but valid account. Since the account is valid, DirecTV servers start to talk to the receiver via satellite to find out if the account is indeed real or a fabricated one. This method of scanning has about seventy percent success rate. Looping sets the smartcard ID to double zero and destroys it about twenty percent of the time. The other eighty percent of the time the card can be unlooped and used again. Hughes and DISH networks realized how big of a problem satellite receiver hacking is and developed new 4th generation cards. These cards have been released on April 2002. Some information has leaked out from Hughes engineers regarding the implemented security algorithm and the cards have been cracked a short time after their release date. DVD Copying DVDs have been around most of the decade. Media companies who manufacture DVD movies encode those using CSS (Content Scrambling System) for copyright protection and digital security of the content. This method prevents copying of a DVD onto a VCR media, or storing the DVD data on a computer. A DeCSS algorithm, released on the net on October 1999, actually breaks the algorithm completely allowing for copying as well as editing of the content on the DVD. Many programs like DVDXCopy and DVD2One use algorithms like DeCSS to decode the information. These programs allow you to back up existing DVD movie onto the hard drive and reburn it afterward. A person backing up his or her movies is not breaking any laws and since DVDs shelf life is long, and the quality is higher then that of a VHS tape, so people see the benefits in doing it. These same programs can easily copy copyrighted DVDs for distribution. It usually take anywhere from six to eight hours to descramble a DVD using DeCSS. The recent program, DVD Decrypt, copies the entire DVD onto the hard disk in about twenty minutes. It also allows selections of the DVD, for example the menu, to be omitted. This allows for faster transfer and compactness to fit the movie onto the current DVD recordable compatibility of 4.7 gigabytes. After copying the DVD to the hard drive using the DVD Decrypt, one would use DVD2One to transpose the DVD into the writeable format. This process takes about thirty minutes after which you can safely use Nero to burn the movie. TiVo Systems TiVo is a playback system that digitally records broadcast video from the TV onto the hard drive. Some TiVo models where able to send recorded TV shows to other TiVo systems. This functionality was used widely until the TiVo, Inc. got sued because the technology allowed for sharing of pay-per-view content. There was no flaw in the design and the device was functioning appropriately, but using it to share pay-per-view material caught the legislators sights. Now, TiVo is not able to send and receive any programs over the network. TiVo uses a standard IDE hard drive as a storage device with the Linux operating system. People have found ways to expand the capacity of the TiVo system using miscellaneous hacks and advanced hard drive mounting commands found in Linux. TiVo revenues suffer because their pricing scheme is built upon capacity of the device. For example, a twenty gigabyte unit will cost 199 while an eighty gigabyte unit will cost 399. It is easily seen that a sixty gigabyte hard drive does not cost 200 dollars and therefore, TiVo is loosing money by not providing component security algorithms. Xbox Console games have been around for a while and every one of them has been hacked. Knowing this, Microsoft designed the Xbox with security in mind. Sometime around June 2002, a mod chip called Enigmah was released. Enigmah chip requires precision soldering of 29 wires onto an Xbox mainboard, which takes around ninety minutes. This mod chip allows an Xbox user to play imported and burned DVD games that can be found on the net, burned from the original, or bought overseas. Second mod chip codenamed Xtender/Xecuter has only nine wires and requires fifteen minutes for the installation. This is a major security design flaw with the Microsoft hardware. PlayStation 2 Sonys PlayStation 2 has also been hacked. Magic 3.1 mod chip takes only nine wires to solder and can play burned DVD and imported games. Recent revision of the mod chip, Magic 3.6, allows for solder-free, five minute installation. Sony is pursuing legal action against web sites who are distributing these mod chips. Unfortunately, Sony had little success in legal courts in Japan, where most of these chips come from. Future Licensed products that require authentication and authorization are created on the basis of cost/benefit ratio. Competing companies want to offer the most bang for the buck to the end user and want to keep research costs to the minimum. Lowering research costs and shortening the research time allows the product to be marketed faster and cheaper then the competition. The product must be fully featured and must have good user interface if it is to sell. Usability and functionality will suffer if the security system is too strong. The product will not perform what it is designed to do and will have less features. On the other hand, if a security system is too lax then hackers will find the flaws fast and companies stand to loose revenue. Future holds the balance between security and usability as well as price/performance of the product. Companies create new products every day and they want their devices to be secure, but at what cost. The cost of an ideal security system will require many months of research and millions of dollars in funds. Companies understand that even if their design is compromised they will loose less money then what would be spent on security research.     -  PAGE 7 -  &,e g CEabwx'(xyPQ ####}$~$<%=%D%))))))))** * * * * mHnHu jU6>*CJ aJ H*HhtrcHdhr HhtrHh:trcHdhr 5CJaJ6>*CJaJmH sH 5CJaJmH sH mH sH ]6>*CJaJ 5CJ aJ ;&4f g LJdEƀ tr^d^JdEƀ tr^d`d$da$)** DbKLbJdEƀ tr^JdEƀ tr^d^L  56"#bJdEƀ tr^d^JdEƀ tr^#xyQRbJdEƀ tr^d^JdEƀ tr^  ###]Td`JdEƀ tr^d^dJdEƀ tr^#~$$<%=%D%YJdEƀr`d^d`JdEƀ tr^D%''1(2())))))))))))**$ !$00]0^0a$JdEƀr^ **** jU*******JdEƀr^$ !$00]0^0a$/ 0&P1h/ =!"#$%@@{SDd*J  C &AheaderbRIu=4@RDnRIu=4@PNG  IHDR6bKGD#2 cmPPJCmp0712`RAIDATx^wegyw{ۜuTi@W\B\5q㸀 &$`MG I#M3s~9׵W]gFXNyH{wcW\ |C$< s"0|"80߅KpE8;cac>"D/%}bІ[zcC^Ъ$\ȅ'5>y'}4hc(x5t%Qh |x̅V.# 8jчA%hF`yk>'QGAo_C }n=<3|i98 (41 `px4`^]܇N> fmhh୷̅ Kk 1Ft + ]_} $~=njtO{t#qL`Ck`#jHF Eɚ6S虶1^9 [JFC=g=幣*NЄ 'ŒM'XSCLR=< w&"fEs!0D2Be~Ff51FèaB KOPR}6'q74A lZ)*dјLce:q78B<1 >q;)9nrT8;^$"`e,IJ]m21:=)ɂ!r9ٚ7v_2{tUnƤp1f㤊P:.F:c&aQ?0$`1 z-Nѵ &H=R"eؒ4 'щBt M<\zd.(]RA«(EkYDA=fz=9?ͳ$lQGYzu8X,0—8%p_(fZ{TFO..G6]r.246M qQQK1!ep;x:t:\p< mhs0]8 xЁOB;˄מAРP6G,~(#`ЇQn( A~o7)†Ldi}9]4}$sO@8W/>򳑹~ %ֳBkw;am4f<cϭ^}?@֙p}hW³GA"HkE6Ah!uQF_؀6/)㤲غGn\ϥa%6= i2؃ApY\+|C"/h(7IH{׮oǎ;O6UkVpZuI'0O"}`3E6Hkd)uaKbs=l쒁mRg#!^[) M ; "A9 ~?K~?zv|5?SaėnּGEA80v,DɈE`y䮕:an<wI`;M5G*ʛMBrZ8u&9(6)l$Peasˇ=zTL>nc'}Ĕ6#jԪE1|##>mxN ӍTB0VrB uўKrp42'jS~jI$VH"ROXrbM2:u-דh(qoĤ_Br K uwHN5&aqTb8> VC.Fk pmHű[.&}ѿ'`uT7Tz. _JOރЧ)>I qm;_/֟BƧޞLƞ5bx7ԬL"[d8u51vwFmD/NMklD_E^{!HS߾\$RK& $2cѩ 4jqHC{TbF )>>7_ӭM5&pTF\֣}s͛3y]5iKEhw}`II]qHǽ-hK =8(yv9G.ѕ}v&Y`ߓ?i 3úspr@q t @l7JFZZ~:98fjuH#a&ڂ(Bow/5~OvEE # )p v}WF& x\3LP t0bju[^bstYCr= k{Ӡ}F![;p~FF E]*"j`or*tvÁ͍ϱ/txl70B( AoXܳ3ɖ4Anн~";]YH ӿxw\cxCBO3y l8uǷ/^D{z~W?!T3ˎetR7q9Ĺd1[$P;ٝ~)#J"q ǪezOq MNm Y.,qW=]'MB^z3ю8n8CZe ر+ ;"`´&OԘKBk<_^cOfn"P0ҤfTLܶ ꋡ-guПd>x}Fpsz{{'4ޅpOBVQ}[~#ڱ1Ԏ&&ٚfbkn!Z$DJT`9LľOpI8p^4)+; Էg_@.:$π؉G#뵩GF Cu}KXQQKFэD"6tX)Yx\R#>iL(Ɠ4 ,`0p %]"* *D;q#qwDc>1<ݎIŒȕYK.`'$:ģ#ऻX8& E`uї~FkDOȇ#4z>z>d<> b/е }Cmc.V*YdƍFSH6v֗e/0Vӂ}f/Nr5]Y啻eSl1 ;gN-IQ+׉MŝOc͛I"9}:voJ׫ :ؒN˃*.ϤkV{˴oEqTVN-e yfi '\KǾ%(XI ұ$/k-b =Se@\M+ns]ܨG+h%NMW@!Gfp$/ግfxۘQsI1K'B BOGH;9pdo8fPzia03oBJ4/op۞(XR1d]f44ntJ&*,ioi|{3c@s ̅pY L#Lߦ.D`Cj>&0UKRG{pD⡉swvSru׏^GΨ߮DW"o,KAq7#u `mX<: @؁8Z>;>]TyeK9;rIg.*tI 8pwυ1GLR8y.' swSwzdT}u>K}Kx4/-C*HjMz8NL䡙ښ9"JB^hADphRocp]r">B_*,9Y|R ې09a)PgwaUpƝ sɥ%"bNWG_qDlwcqn98hod#ٶY̎jJup`yЬ Vc`J`a$Viw3#6\[8z.$ i[#6Wrpu_b)p9Q01Bz=6R L{&l^z=<}Xtf)+e]q'Qa[%DtRkGNmࢲ9.&qkoCH naή/ŽMEQZW<{ @V/ eQV`XC, tNGmhn.:gt*ʱȠᐙ"yX$# vjܦ Z (tD4"ѨJ Hƥb>J!J4Hϼq;c_䃿xu&8:&c}GЍ<>? ߡmZ+M䐹hk69K&ǮgD%)]m!ٗXg;(&ØqKY\`f'/ڿ16OѨ]9R̊L]ÜgOce_}# 2y*ms#6 w2w*oE-zAji]}][%Sn8Ootz&{V tmA2"dhaEgn"?oݳts2P9M$u0T]q[%X#vGCy 1^4g{bh-{7^i4!Tzפ5jf$U} t_DoJ_b(;פuA°"fõ?A?4|E~?ߺ@?6|ZsGm:_Gf}= ЎAi@bqY!y˪- "3A, ;~BrN;'LشQRj0a:Ê; :whÔh D 7o5!螠| \[G{V7 HJvflp ]? !XYR#Xh N q"XKa8[n1gNaMte)hIDAM+A#A"*509FqEcÎϐl4q8,=xk &M b.>Y}m @]f 3S! wK.xSSP_V'JV}@?~ ~=זTbx?7ܓ$s޿xm3+ZqhjG KfKP=l%]@WzgbUI9K+0dZ[:a bGli0!M@G1WRd(/\ ˞M\Rl: E\TQK@Ba%#5pQ15(q9I-FFB⅀Gi *DnmT&FYDA pR:X =ܱKMNHܛiInup*vG Ӻ\6N޽ta=0ٳg.'qƭy8|2H$[(0:zH\d1RkIإ hB: {^w}iu?~իOW޳g{5J=jl:PA,pl (sQDV(˺_4j4m5z&- =#Оm+K@d".ۦ:v\C)p5kD,Tc#2!٥ !%#%PA'] E_}}$D\At Gv [Ї%Uԣh9Fh ef!RR9lPM0i$/a2yr}`BXu>7r2ڼG{Q\;* hg|Mui9W8ElI8nQ婺ncT3p̨ OfGv!ml&Aߩcx^V@{$($*gawU\8Dk7ᕻgqß}K{_RFO +g:l89&8*жREkn3Wvͻ1:DŽ>A(xkN\VQoxP>oe5z}o+Z6̶u eMUv)ۻkDwIw[[\!r#OSAd r i7p:`)plwfFk‘SNH6oqڽT<0%1g m|Ur]*e$@п7[g_2Xs3A Bv*&9U$x3LPb Hzן;gLJ{y,8z>ifp4HiLbqh0>EWt>|1 o"OX':z>~rNއρw/mF NFv0&y~l3&><:p%xq B3 T(uJ<]^8%bNo\N ܮF6X8*tb8վ1v?>*z8eV0דU4͠j\w᫫/Dí<`z)#P -Ah~M3 4,끌(Pr%X#Iψ/_[p(mYl'qdcra H ' Z6Ꮔ L?ov)#gy n,5WK=7x*h޼>SL5pǶ^*zu0C[X`%#;~p=vKo>3A!Uw73{ӓ[G3K]z_}ّ8#A2phWa=\./49r(`anG1+8L)au؜Tt",٦ \2MOwVOt{[>tu;lQ&E yC{ػD8@I̵u L2 N$bNvSԥH) 5FaOXH0G_=Ie:> :M>+=$%xAÞk{j٥]I4ia*R$t k7(d'r)RIKJ nLiZǥ(p"0 wk3 "1\Fx_!tc~&ԇ_95Suعgk+?Z;D²<#_򱙙b>{ݍ_Om=w|RZYF)Rt6)L tB UsvdflS{<|l `z9b gm'%4F&sVљUȉnE`|`'Z-؜ -]S쉁L nS37.i;I As6m> [/  fJ* G ag|Y& ivtڑˉ*z-tpЋ0:YY8Ƭ 污2P Bǽ\* 6)SKKNL<ܘf8ND"!%xw]bnIt4S S8:þb/u5wQpI}Q&',T(gEp'^iK1%qt* #'N <0kxV0{(V5(<# Wy%YxRԔmoԦƀȦ)݊ak3h(F?E%_Gѻ=c~=L3?iÃ}Gu//Z k__ܖ뱸7 xһswȗX, Žx2ODnC&Z}J1K];Ly8 a@-X!f+NTQ(Vkøp9"l wa32Y9Hi *GSUՁ$}waC987`mC\B@)k=QpcD/"z@ƘrsUU]Pjm 78UnAb4xSKHmu-j vwp$z!R1!TC-2` ,<G, 41CiUxq:1a*U <;Im+u(wGn V`\3'7zlaهvg.+ܛs5$~in}s/~,{Xb0hn"Gh{ ljqa縶s̞Zi ; k:ó)Nu. dBsIye:Hr]v*n8~B%,,5/qC/5K9'25 ,bíT4WpNwdRm?VD*ɵj'5ƽFI!rFGkNNtGμؒj2Ah| *}Bv F=x$37 ^!Ovc5F}!"aBf#l&h2S7$Byfثe&EΆZ-ÀD!Ap@5t #q6۰pAC"yq*G Tr܆'92%#v$FnL^O ΈcIuғ=g\THǸO38@CATGz Hc kdF  r*yaU3 ;23Sha ud冑 (r W W L[x(BAzE(d~iD,ZU?6t01@w3ML V=HKVYSi" :@}.]ir{@|B"l,#4dhp*ւ?!CXȲ#ЗUHZhDr os.y:(H0dH)x&O5`Q<>U vwߞ/k7?7>55ޗj4eΓ-w]6QH;db&H9nق`Oppk$Nf2\}\-C?S .FmSd巀~k&,.:ѓ 2IT(d=3Qvʴ׀ :ńEa$)2lŝ.3<(_UO ?<352n ^MGm INlàѠx@{ȫ&N@6T .D1ŪZ& F6Bl&|P2(&iJHkd2pش:~J 0J ZZ?k_eeJO'Чܯ!Z~p,ݿgQMEWyPA# @:pMk| :)P%8P?s s<~T^* 𩠘 V N` j#S QV샠NU=j>@*t+GiJ}20 *@̠/WE $e"A?]Wx#eK H%?p2=S^}ǃ:G H>`9%zQ ,(kPSpv/A8ց9W=;Ǯne:4L6$|9nxעDiuZ~g(^,$5nAGiÃ#^K1 ʘM -:`N?Ֆƍ1]Kmj#0 m3%3fFh,`E&ؠA0wl~܁It\v<75r^fPEFtR-X;ӧ`rK5߂iYLCzPƠ3&6£;hC4 qdv #>R.l۰g=v*T0%pѨ$69Af(?96kؽx% qR`Uh>UI,~N~o`Dў8 %ů(ϸ'UH{䙤;kgֈfdNS{@@tJt c)ww7ͪ'ix]19)LV5TXV}cKFT}ˬX؃h2Lhe@Cb5p&fxt w`|&< IGo|4ydSn{yڏ#k|g^oo֧[ϣ13z@kg)h :~_n7wJ}q{G-}8 ߾z_[w輷0[{ -G%`nO}-fos~u̷Wo~(\ūc~07Ro?jKÍk;rjխ`,G:~a9گTGa Kg>T/敷FO^]vh̍GgWϚߙ/{͘o(uY݋vqq^ )Cp!{sN`)Cװ)0q(#HDp.TYzc}%<61>Ӆx M g+ d?qEC$4DMI&ב6Eu<>*yU4- Ʋ1՗{#Y})ȩxksXeAs*@ECFeOvW!9 2@ۻ;0q)ӃW[!ʩ[*&u +2Åe8XNϸp8qjE<2X9zȡ\{,i[7L2 ؿ]aN" $35Vw"lA \I}={a/ANQxi~FO\\މ'􎧘kjcNƧG`R. i"#Ep! KPeW5b`je۫2#U L >綱 u<$1.MUt0STRGK^TʻrRK"-Gu!hOc**^mr~GKF}t@q\w3t±F)̇WUut=:45 S5y rד:>Rwsj9:u w+^F=i,"~&:!XiC. EGX]Vy<9mOCi$h)JIIBx,cg&x]:=!>! ` SHQU!ul2BAy gtljS.%Lu:Ce(lIH:,ñ\~eYĥH4,$JD$gmpU' AQ&HJnC6k<\M*NEHC,6͛t21Q+x۪_ǒ4e2{ ܨ\r{{KJz^W.ɕK˽ˠ6WugU8ϥ]`ec{bvU;StvUpNkk$KBjdg۵ՁZBjmobv3 EyndwNoR1F'4IT 648d~-{qiMvvD$Bkmf ` !ʻDFām5SHBL5([FnOtyzL\k6ź5,TVD-=2PqI7 )Ab>&0Y!Z,$,E֓!oκku˓v1r1~hpQ9͚N@~h R [Y~KӨs~(6$>ۖsxAe7@e~ج !WLMmŠu ȗ>` % C g Ϛ-"1I)ek,oV[y6 PQ妨ξ?Nm5 }̅!@=ʖæR! A^ed8atzPن-vL&d`(e ȭ]|P`7U;#j.j3w_T0D˧"WTOsF(TXņ'ⳣeJgXRbXWK#{i^ wz晒ul4_I5"S(oIjr;hP7H"  m;qߝS,%'I *5JYj}uJ*&+5}35(d¶:oU'O?^ICN$(-AMe|K@:551&ViNaLq"9vLJj(vw6֯ 6/d5TkVJȞ!Fq\Wc9,OyťLC|_"yopI0iRX - q߀p6Ԙ)t[6)E-/1V d#kB@]3!Dʕz4%M!\XW:.]S\){BN7MNr=n ~든DETf1'(l fx}$`Q{_dd_o[oa#6Xրlc$#DBQj=&-f6B [ BDLWX_ґn׆ŀ->I)Q0c )zij"CXݎbP2z/SiŚLii%)v*b WֹO HBA,?[ڥjlQRFg,Lܓzf_Z2aAtq{EOtPm ,[n)&Dէ& R"7@v1m<i՟ǘ-"/'ͶW9g{GgɊPO`{]Yh`TKv+>(Tpϩ5(94/?`- X ~(À7T@5zd. UvP++c9x9V(+&}}֝ؠNJ/_Y,QbU?jGXiŨRUQn(AAbƳW0Ƈgqk4 .M7:|"I\ۙdc{:O~k] kmxB Es*%b'VٜoN'@əruU&4/E;ƺ1=XNr m %3vk]͆% ~ M(-bPϒtpF-) e(M"$|5$am̄:L,$T';B"f?:ܼ$Rx\@i_klخQKeXԩG2xb$, r߅" +̯lSs M#7_w[˭,FPU1>M7J3iUPޥWX,qQ{0/SiZQ M'{,޺2f"~S}CJeo4ުt9jLLPb#ORᛏW(j6(dwEh7´ 4C&MLEVWO[{DҒyIRƈ5RٞjWl6]0Q|SsX%yG (ʋWz#U5g|Xvo@"τ }J-II kvH5IPZ"J-.L٠4)F>d Cg9:d~|4H"k(˕*3V7fSu@ uĢ<(ЌGr%X\e3&Ai1ڲ(쓑h}U=w nGL}F#hk7=i,R Q:y}gOi&r!* Brˢbq6_a掑xء!lT iU^@ca`ma ?èr$Ʃ7c}"qC)cq$8PnߧSj9IENDB` i8@8 NormalCJ_HaJmH sH tH <A@< Default Paragraph Font@@  Balloon TextCJOJQJ^JaJ,@, Header  !, @, Footer  !&&F&4fgD b K L  56"#xyQR~  nl 66T7Rpl]Iwp4~Ohpp^p`OJQJo(hHh@ @ ^@ `OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHhPP^P`OJQJo(hHh  ^ `OJQJ^Jo(hHoh^`OJQJo(hHhpp^p`OJQJo(hHh@ @ ^@ `OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHhPP^P`OJQJo(hHh  ^ `OJQJ^Jo(hHoh^`OJQJo(hHhpp^p`OJQJo(hHh@ @ ^@ `OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHhPP^P`OJQJo(hHh  ^ `OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJQJo(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJQJo(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHIwp7R 6~ &                                              @ @@A&`@Unknowndtaylor Ilya BurdmanGz Times New Roman5Symbol3& z Arial5& zaTahoma?5 z Courier New;Wingdings"1hsRtfEr|HBH D!0dj&%2QHXSecurity in Distributed Systems Ilya Burdman Ilya BurdmanOh+'0 ,8 T ` l x Security in Distributed Systemsecu Ilya BurdmanistlyalyaNormalr Ilya Burdmanist3yaMicrosoft Word 9.0u@G@V@b@\^e|H՜.+,D՜.+,T hp   NASA/SEWPgBj&  Security in Distributed Systems Title Plt _PID_HLINKS_AdHocReviewCycleID_EmailSubject _AuthorEmail_AuthorEmailDisplayName_PreviousAdHocReviewCycleID_ReviewingToolsShownOnceAHls*headerמqFinished Part One.ndtaylor@sewp.nasa.govceDennis TaylorasaPfenn  !"#%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMOPQRSTUVWXYZ[\]^`abcdefhijklmnqRoot Entry F@esData ${S1TableN WordDocument1FSummaryInformation(_DocumentSummaryInformation8gCompObjjObjectPool@e@e  FMicrosoft Word Document MSWordDocWord.Document.89q